• Title/Summary/Keyword: 이슈 분석

Search Result 2,732, Processing Time 0.031 seconds

A Comprehensive Review of the Foreign Literature regarding Protest Crowd Counting (집회시위 참가인원 집계방식에 대한 선행연구 고찰 - 국외연구 분석 중심으로 -)

  • Kim, Hak-kyong
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.9-34
    • /
    • 2019
  • The Korean Police Force is equipped with the dual responsibility to not only protect the constitutional right to protest, but also prevent potential disorder and misconduct might be caused by the abuse of such a right. To this end, the Korean national police employ the crowd counting methodology, termed 'Maximum Figure at Any One Time' with a view to dispatching the proportionate number of police officers to protest scenes for safety management. However, protest organizers rather take advantage of 'Cumulative Figure' methodology, the purpose of which being to publicize the wide recognition of success, noticeably by demonstrating that as many people as possible support for their cause or voice. Hence, different estimates generated by different methods have raised serious political issues in Korean society. Nevertheless, it is found out that there are only three existing academic studies in Korea regarding crowd counting methods, and they are mainly geared towards comparing the two methods, unfortunately without any attempt to analyze the foreign literature in details. Keeping the research gap in mind, the research conducts a comprehensive review of the foreign literature with relation to protest crowd counting methods. Derived from the review and analysis, the counting methods can be broadly categorized into the three models such as: 1) Grid/Density Model, 2) Moving Crowds Model, and 3) Electronic & Non-Image Model. In the end, the research provides brief explanations regarding specific research findings per each model, and further, suggests some policy implications for the development of more accurate crowd counting methodology at protests in Korea.

Oxide Films Formed on Hot-Dip Aluminized Steel by Plasma Electrolytic Oxidation and Their Films Growth Stages (플라즈마 전해 산화법에 의해 용융알루미늄도금 강판 상 형성한 산화층과 그 성장 과정)

  • Choe, In-Hye;Kim, Chang-Min;Park, Jun-Mu;Park, Jae-Hyeok;Hwang, Seong-Hwa;Lee, Myeong-Hun
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 2017.05a
    • /
    • pp.165-165
    • /
    • 2017
  • 지난 수 십 년 동안, 전 세계적으로 자원의 소비가 급격히 증가하게 되면서 최근 자원 고갈은 물론 환경오염이 커다란 이슈로 문제가 되고 있다. 이에 따라 재료 관련 분야에 있어서는 보다 효율적이고 친환경적인 방법으로 자원을 활용해야 된다는 필요성이 대두되었고 이와 같은 관점에서 목적하는 성분이 우수하고 환경 친화적인 표면처리 재료 개발연구가 활발하게 진행되고 있는 실정이다. 그 중 플라즈마 전해 산화(Plasma Electrolytic Oxidation, PEO)는 알루미늄, 마그네슘 등의 경금속의 경도를 향상시키고 높은 내마모성, 내식성을 갖게 하는 표면처리로써 그 관심이 증가하고 있다. 이 플라즈마 전해 산화는 일반적으로 공정비용 대비 효과적이고 환경 친화적이며 코팅 성능 면에서 우수하다고 알려져 있다. 이러한 고유한 특성으로 인해 플라즈마 전해 산화 코팅은 최근 몇 년 동안 기계, 자동차, 우주항공, 의학 및 전기 산업 등의 분야에서 그 적용이 점차 증가하고 있는 상황이다. 한편, 플라즈마 전해 산화 코팅을 하는 모재들의 경우 부동태 산화피막을 용이하게 형성할 수 있는 특성의 모재에 한정되고 있어서 그 응용확대에 한계가 있는 것이 사실이다. 따라서 본 연구에서는 플라즈마 전해 산화법을 사용하여 용융알루미늄도금 강판 상에 산화피막 형성을 시도하였다. 전원공급 장치의 양극은 전해질 속에 잠겨있는 작동전극에 연결하고 음극은 대전극 역할을 하는 스테인레스강 전해질 용기에 연결되었다. 전해질은 Sodium Aluminate 및 기타 첨가제를 함유한 것을 사용하였고 온도는 열교환기를 사용하여 $30^{\circ}C$ 이하로 유지되었다. 또한 여기서 전류밀도는 $5{\sim}10A/dm^2$, 실험 주파수는 700Hz, Duty cycle은 30 및 90%의 각 조건에서 공정처리 시간을 각각 30분 및 60분 동안 진행하였다. 이와 같은 조건에서 형성한 막들에 대해서는 주사형전자현미경(SEM)을 이용하여 코팅 막의 표면 및 단면의 모폴로지를 관찰하였음은 물론 EDS 및 XRD 측정을 통하여 원소조성분포 및 결정구조를 각각 분석하였다. 또한 이 코팅 막들에 대한 내식성은 5% 염수분무 환경 중 노출시험(Salt spray test), 3% NaCl 용액에서의 침지 시험 및 전기화학적 동전위 양극분극(Potentiodynamic Polarization) 시험을 진행하여 평가하였다. 이상의 실험결과에 의하면, 제작조건별 플라즈마 전해 산화 코팅 막의 모폴로지 및 결정구조가 상이하게 나타나는 것을 알 수 있었다. 코팅 막의 모폴로지 관찰 결과, 공정 시간에 비례하여 표면에 존재하는 원형 기공의 수는 감소하였으나 그 크기가 커지고 크레이터의 직경 또한 커진 것이 확인되었다. 이 기공은 마이크로 방전에 의해 형성된다고 알려져 있는데 공정 시간이 증가함에 따라 코팅 두께가 점차 증가하여 마이크로 방전의 빈도수가 줄어들고 그 강도는 증가하게 되어 기공 크기가 증가한 것으로 사료된다. 또한 공정시간이 긴 시편에서 표면에 크랙이 다수 존재하는 것으로 확인되었다. 이것은 방전에 의해 고온이 된 소재가 차가운 전해질과 만나게 되어 생긴 큰 온도구배로 인해 강한 열응력이 발생하여 균열을 초래한 것으로 보인다. 조성원소 분석 결과 원형 기공 주변의 크레이터 영역에는 알루미늄이 풍부하였으며 그 주변에 결절상을 갖는 구조에서는 전해질 성분의 원소가 포함되어 있는 것이 확인되었다. 이러한 코팅 막의 표면 특성은 내식성에 영향을 주게 된 원인으로 사료된다. 동전위 분극측정 결과에 의하면 플라즈마 전해 산화 공정 시간이 길어질수록 부식전류밀도가 증가하였다. 이것은 공정시간이 길어짐에 따라 강한 방전이 발생하여 기공의 크기가 증가하고 크랙이 발생하게 되면서 내식성이 저하된 것으로 판단된다. 종합적으로 재료특성 분석 및 내식성 평가를 분석한 결과, 플라즈마 전해 산화의 공정 시간이 너무 길게 되면 오히려 내식성은 저하되는 것이 확인되었다. 이상의 연구를 통하여 고내식 특성을 갖는 플라즈마 전해 산화 막의 유효성을 확인하였으며 용융알루미늄강판 상에 실시한 플라즈마 전해 산화 처리에 대한 기초적인 응용 지침을 제시할 수 있을 것으로 사료된다.

  • PDF

Design and Analysis of Online Advertising Expenditure Model based on Coupon Download (쿠폰 다운로드를 기준으로 하는 온라인 광고비 모델의 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.1-19
    • /
    • 2010
  • In offline environment, unlike traditional advertising model through TV, newspaper, and radio, online advertising model draws instantaneous responses from potential consumers and it is convenient to assess. This kind of characteristics of Internet advertising model has driven the growth of advertising model among various Internet business models. There are, conventionally classified, CPM (Cost Per Mile), CPC (Cost Per Click), and CPS (Cost Per Sales) models as Internet advertising expenditure model. These can be examined in manners regarding risks that stakeholders should stand and degree of responsibility. CPM model that is based on number of advertisement exposure is mechanically exposed to users but not actually recognized by users resulting in risk of wasted expenditure by advertisers without any advertising effect. While on aspect of media, CPS model that is based on conversion action is the most risky model because of the conversion action such as product purchase is determined by capability of advertisers not that of media. In this regard, while there are issue of CPM and CPS models disadvantageously affecting only one side of Internet advertising business model value network, CPC model has been evaluated as reasonable both to advertisers and media, and occupied the largest segment of Internet advertising market. However, CPC model also can cause fraudulent behavior such as click fraud because of the competition or dishonest amount of advertising expenditure. On the user aspect, unintentionally accessed advertisements can lead to more inappropriate expenditure from advertisers. In this paper, we suggest "CPCD"(Cost Per Coupon Download) model. This goes beyond simple clicking of advertisements and advertising expenditure is exerted when users download a coupon from advertisers, which is a concept in between CPC and CPS models. To achieve the purpose, we describe the scenario of advertiser perspective, processes, participants and their benefits of CPCD model. Especially, we suggest the new value in online coupon; "possibility of storage" and "complement for delivery to the target group". We also analyze the working condition for advertiser by a comparison of CPC and CPCD models through advertising expenditure simulation. The result of simulation implies that the CPCD model suits more properly to advertisers with medium-low price products rather than that of high priced goods. This denotes that since most of advertisers in CPC model are dealing with medium-low priced products, the result is very interesting. At last, we contemplate applicability of CPCD model in ubiquitous environment.

The Distribution and Characteristics of Protected Areas and Natural Resources in the Metropolitan Area in Blog Posts (블로그 게시물에 나타난 수도권 보전지역 및 자연자원의 분포 및 특성)

  • Lee, Sung-Hee;Son, Yong-Hoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.50 no.5
    • /
    • pp.30-39
    • /
    • 2022
  • This study aimed to evaluate the awareness of conservation areas and green resources and analyze their characteristics by utilizing accumulated blog data created for specific places and objects. Among all the conservation areas and resources located in the Seoul metropolitan area, places that can be evaluated were classified, and sites were evaluated by dividing them into ten categories based on the number of blog posts written. As a result of the study, the users' awareness of forests was the highest, and the awareness of conservation areas and green resources was higher in urban areas than suburban areas. The result shows that the conservation areas and green resources located around the metropolitan area serve as natural tourist destinations while being the object of conservation for users. In addition, these results are in the same vein as the research results in domestic and foreign studies on the importance of ecosystem services in urban areas. Unlike existing research methods, this study is meaningful in that it identified the level of user awareness through social media analysis and applied it to evaluating conservation areas and green resources. It can be used as basic data to prepare a management plan considering public interest and awareness or to establish a development plan to increase awareness. In addition, the cumulative amount of blog content used in the study is meaningful in that it can identify and monitor users' interest in the space. However, it was not possible to examine the contents of each blog in detail because it was evaluated based on the amount of social media content. In addition, in the case of conservation areas and green resources, it is necessary to review and supplement the evaluation contents by adding keyword analysis and content analysis for the site to be evaluated as content other than the pure viewpoint of users may be mixed with development issues.

Analysis of the First Time User Experience of the online memorial platform and suggestion of service developments (온라인 장례 플랫폼의 초기 사용자 경험 분석및서비스 개발 제안)

  • Jueun Lee;Jindo Hwang
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.44-62
    • /
    • 2024
  • The development of online funeral services and social issues of eco-friendly funeral culture have raised awareness of the new need for online funeral culture. There have been several attempts to revitalize online funeral services in domestic institutions and companies, but the effect is weak. The purpose of this study is to propose a design that can improve the accessibility and usability of online memorial services by analyzing the usability problem factors through a First Time User Experience analysis of the online memorial platform. Therefore, in this study, in order to identify the problem factors of the online memorial platform, a literature review on the UX, OOBE, and FTUE theories was conducted. The subject of the study was the app 'Memorial'. Before analyzing the First-Time User-Experience, IA was compared and analyzed with other similar services to understand the characteristics of the UX service of the app 'Memorial', which is the subject of the study. In addition, tasks corresponding to the Unpack-Setup/Configure-First Use stage were performed on 10 subjects who had no experience using the online memorial platform. The experimental process was expressed as the UX Curve to identify factors that caused negative experiences. As a result, the major problem factors included unnecessary UI elements, the need for sensitive personal information at the membership stage, and lack of immersion in the service. The improvements included strengthening community functions to facilitate the sharing of emotions and promote smooth communication between users. We proposed UI/UX service developments that enhanced the app by incorporating these insights. In order to verify the effectiveness, serviceability, and value of the developed prototype, an interview with a expert was conducted. The interviewes consisted of three service design experts. This study was conducted to contribute to the quality improvement and activation of the recently emerging online funeral services. The study is significant as it aims to understand the current status of these services and identify the factors necessary to improve service accessibility and usability. Subsequent studies require in-depth user verification of how much the proposed improvement plan affects the actual user experience.

Employment Gap Between Capital and Non-Capital Regions since the Global Financial Crisis in Korea (글로벌 금융위기 이후 수도권과 비수도권 간 일자리 격차)

  • Jun Ho Jeong
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.27 no.3
    • /
    • pp.155-173
    • /
    • 2024
  • Using Regional Employment Survey, this article analyzes the widening employment gap between Capital and Non-Capital regions since the 2008 global financial crisis through describing the spatial distribution of employment by industry and occupation, calculating the regional downward employment rate of university graduates, and estimating the regional distribution of employment growth in terms of wage distribution, and then statistically analyzes the effect of the declining manufacturing employment in the Non-Capital region since the mid-2010s on total employment change. The results from these analyses are as follows. First, since the mid-2000s, the share of producer services and white-collar jobs has increased in the Capital region. Second, the Non-Capital region has a higher share of non-regular workers relative to wage workers than the Capital region. Third, while the downward employment rate has increased in the Non-Capital region since the mid-2010s, it has risen very modestly or stagnated in the Capital region. Fourth, in terms of wage distribution, the pattern of employment growth since the mid-2010s has been U-shaped, a typical polarized pattern of simultaneous growth in low- and high-wage jobs and decline in middle-wage jobs in the Non-Capital region, while in the Capital region it has been L-shaped with the sides reversed, driven by growth in high-wage jobs. Fifth, this employment polarization in the Non-Capital region since the mid-2010s is associated with employment changes in manufacturing, which accounts for a large share of middle wage jobs. Finally, according to the analysis of the effect of regional manufacturing employment changes on total employment changes since the mid-2010s, declines in manufacturing employment reduce the region's regular employment rate and have a larger negative employment effect in the Non-Capital region. Based on these findings, some policy issues are discussed including the branch plant economy regime based on spatial separation of conception and execution, the mix of geographic and skill mobility, the need to improve employability and jobs through human capital accumulation, and short- and long-term responses to employment fluctuations.

Sentiment Analysis of Korean Reviews Using CNN: Focusing on Morpheme Embedding (CNN을 적용한 한국어 상품평 감성분석: 형태소 임베딩을 중심으로)

  • Park, Hyun-jung;Song, Min-chae;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.59-83
    • /
    • 2018
  • With the increasing importance of sentiment analysis to grasp the needs of customers and the public, various types of deep learning models have been actively applied to English texts. In the sentiment analysis of English texts by deep learning, natural language sentences included in training and test datasets are usually converted into sequences of word vectors before being entered into the deep learning models. In this case, word vectors generally refer to vector representations of words obtained through splitting a sentence by space characters. There are several ways to derive word vectors, one of which is Word2Vec used for producing the 300 dimensional Google word vectors from about 100 billion words of Google News data. They have been widely used in the studies of sentiment analysis of reviews from various fields such as restaurants, movies, laptops, cameras, etc. Unlike English, morpheme plays an essential role in sentiment analysis and sentence structure analysis in Korean, which is a typical agglutinative language with developed postpositions and endings. A morpheme can be defined as the smallest meaningful unit of a language, and a word consists of one or more morphemes. For example, for a word '예쁘고', the morphemes are '예쁘(= adjective)' and '고(=connective ending)'. Reflecting the significance of Korean morphemes, it seems reasonable to adopt the morphemes as a basic unit in Korean sentiment analysis. Therefore, in this study, we use 'morpheme vector' as an input to a deep learning model rather than 'word vector' which is mainly used in English text. The morpheme vector refers to a vector representation for the morpheme and can be derived by applying an existent word vector derivation mechanism to the sentences divided into constituent morphemes. By the way, here come some questions as follows. What is the desirable range of POS(Part-Of-Speech) tags when deriving morpheme vectors for improving the classification accuracy of a deep learning model? Is it proper to apply a typical word vector model which primarily relies on the form of words to Korean with a high homonym ratio? Will the text preprocessing such as correcting spelling or spacing errors affect the classification accuracy, especially when drawing morpheme vectors from Korean product reviews with a lot of grammatical mistakes and variations? We seek to find empirical answers to these fundamental issues, which may be encountered first when applying various deep learning models to Korean texts. As a starting point, we summarized these issues as three central research questions as follows. First, which is better effective, to use morpheme vectors from grammatically correct texts of other domain than the analysis target, or to use morpheme vectors from considerably ungrammatical texts of the same domain, as the initial input of a deep learning model? Second, what is an appropriate morpheme vector derivation method for Korean regarding the range of POS tags, homonym, text preprocessing, minimum frequency? Third, can we get a satisfactory level of classification accuracy when applying deep learning to Korean sentiment analysis? As an approach to these research questions, we generate various types of morpheme vectors reflecting the research questions and then compare the classification accuracy through a non-static CNN(Convolutional Neural Network) model taking in the morpheme vectors. As for training and test datasets, Naver Shopping's 17,260 cosmetics product reviews are used. To derive morpheme vectors, we use data from the same domain as the target one and data from other domain; Naver shopping's about 2 million cosmetics product reviews and 520,000 Naver News data arguably corresponding to Google's News data. The six primary sets of morpheme vectors constructed in this study differ in terms of the following three criteria. First, they come from two types of data source; Naver news of high grammatical correctness and Naver shopping's cosmetics product reviews of low grammatical correctness. Second, they are distinguished in the degree of data preprocessing, namely, only splitting sentences or up to additional spelling and spacing corrections after sentence separation. Third, they vary concerning the form of input fed into a word vector model; whether the morphemes themselves are entered into a word vector model or with their POS tags attached. The morpheme vectors further vary depending on the consideration range of POS tags, the minimum frequency of morphemes included, and the random initialization range. All morpheme vectors are derived through CBOW(Continuous Bag-Of-Words) model with the context window 5 and the vector dimension 300. It seems that utilizing the same domain text even with a lower degree of grammatical correctness, performing spelling and spacing corrections as well as sentence splitting, and incorporating morphemes of any POS tags including incomprehensible category lead to the better classification accuracy. The POS tag attachment, which is devised for the high proportion of homonyms in Korean, and the minimum frequency standard for the morpheme to be included seem not to have any definite influence on the classification accuracy.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A Study on the Influence of Youth Startup Support Project in Gangwon-do Province on Startup Performance (강원도 청년창업 지원사업이 창업성과에 미치는 영향에 관한 연구)

  • Yun, Jiwon;Park, Woojin;Bae, Byung Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.4
    • /
    • pp.135-149
    • /
    • 2020
  • As youth employment has become a social issue every year, the government is pushing for policies to support youth start-ups to create jobs voluntarily as a way to enhance the youth employment rate. In the case of young people in Gangwon Province, the number of people moving to other regions is increasing. This research is intended to empirically analyze the actual achievements of youth start-ups through the 'Youth Start-up Project' in Gangwon-do. It was divided into four categories: participation in government support, education completion, intellectual property right retention, and certification retention, which are characteristics of start-up companies, and hypotheses that they will have a positive impact on start-up performance (sales amount, duration of existence, or whether they are retained or not). Age and geographical factors (Yeongdong and Yeongseo) were injected as control variables to see how they affect them. Furthermore, empirical analysis was conducted by setting up a hypothesis that the characteristics of start-up companies and subsequent support between start-up performance would have a positive intermediary effect. The research results showed that the remaining characteristics, except for education completion, had a positive impact on sales, and that the more participation in government projects, the longer the duration of the company's existence. In addition, the level of participation in government support projects was significant in the direction of the government. The analysis results of the parameter, follow-up support, had a positive impact on the start-up performance, and the subsequent support mediating effect showed the mediating effect of the start-up performance, except for geographical factors. The results of this study suggest the need for customized support suitable for the characteristics of youth start-ups in order to enhance the performance of young start-ups. Support agencies need to refer to corporate characteristics for smooth management and selection. In the Gangwon-do area, the government should seek to provide timely and organic support for start-up companies in order to produce successful start-up cases.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.